BT

Facilitating the Spread of Knowledge and Innovation in Professional Software Development

Write for InfoQ

Topics

Choose your language

InfoQ Homepage Presentations How Performance Optimizations Shatter Security Boundaries

How Performance Optimizations Shatter Security Boundaries

Bookmarks
47:10

Summary

Moritz Lipp explains how the Meltdown and Spectre vulnerabilities exploit hardware optimizations to read otherwise inaccessible data processed on the computer. He explains the background to understand the underlying issue and the uncomfortable security consequences they bring, and why it is no coincidence that four teams of researchers discovered the same vulnerabilities in the same time frame.

Bio

Moritz Lipp is a researcher in information security at Graz University of Technology. He is pursuing his PhD with a strong focus on microarchitectural side-channel attacks on personal computers and mobile devices at the Institute of Applied Information Processing and Communications. His research has been published at top academic conferences and presented on different venues around the world.

About the conference

Software is changing the world. QCon empowers software development by facilitating the spread of knowledge and innovation in the developer community. A practitioner-driven conference, QCon is designed for technical team leads, architects, engineering directors, and project managers who influence innovation in their teams.

Recorded at:

Apr 14, 2018

BT